business issues - News, Features, and Slideshows
- Have a company laptop? Here's how to keep your browsing private
- 5 secrets to building a great security team
Both the lines of business and IT departments acknowledge the value of "Bring Your Own Identity" (BYOID) initiatives, where social networking or digital IDs are used for application login.
IBM has purchased Lighthouse Security Group and plans to combine it with another recent acquisition to build a set of identity management software and services.
Key technology companies including Google, Microsoft and Twitter have filed in support of Facebook's dispute with the New York County District Attorney's office over the collection of user data in bulk under a gag order for a fraud investigation.
Gemalto plans to acquire SafeNet for US$890 million in a deal that would combine a big vendor of portable secure elements such as payment cards with a provider of enterprise data protection technology.
Prime minister David Cameron invited young technology companies to pitch at No. 10 Downing Street for the first time ever yesterday in a move that suggests the politician is keen to be seen supporting the tech start-up community.
Computerworld Hong Kong took an in-depth look at the top ten events that shook the local and global IT world in 2013.
As 2012 draws to a close, Ericsson ConsumerLab has identified the hottest consumer trends for 2013 and beyond. For more than 15 years, ConsumerLab has conducted research into people's values, behavior and ways of using ICT products and services.
Some of the most memorable IT-related quotes were uttered in courtrooms this year, which involved a steady stream of legal challenges about intellectual property. In no particular order, these are some of the comments that stuck with us as 2012 winds to a close.
Studies show that employees are engaging in rogue use of the cloud, even when IT organizations say they have clear formal cloud policies and penalties for violation of the policies.
Sign up now »
Manage the complete audit lifecycle from audit universe identification and risk assessment to management/board reporting and quality assurance.
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.